Children's data hacked after school software firm missed basic security step, internal report says
The hack of a company that helps schools track tens of millions of students appears to be the largest breach of American children's personal information to date, school officials and cybersecurity experts say.
And a specially commissioned interim cybersecurity audit by cybersecurity company CrowdStrike showed that the company had apparently failed to take basic precautions to protect students' data, according to a copy exclusively obtained by NBC News and records of internal discussions.
The company, PowerSchool, is best known for its Student Information System (SIS), one of the most widely used education tech programs in the U.S., and one of the breached systems. The SIS software helps school districts keep track of K-12 students, collecting information like their name, school, birthday, address and parent or guardian. Many districts go further and add information like their Social Security number, health concerns or disciplinary records.
Theft of children's data is regarded as particularly egregious, as they usually have no agency in how it's protected. It can be difficult to draw a direct line from a particular data breach to a given instance of identity theft, as cybercriminals repeatedly repackage and resell victims' information. But identity theft cost Americans around $43 billion in 2023, according to a 2024 study by AARP.
'We recognize the significance of this incident and are deeply regretful that it occurred,' Beth Keebler, a PowerSchool spokesperson, said in an emailed statement. 'PowerSchool has significantly invested in its cybersecurity program, culture, and talent over the years — this has been a diligent and continuous area of focus and one the Company plans to continue to invest in.'
Cybercriminals who steal sensitive data often threaten to publish it if they're not paid a ransom. PowerSchool declined to comment to NBC News about any extortion demand or payment. But in a private virtual briefing with customers, the company's chief information officer, Mishka McCowan, said the company had paid the hacker and received a video of them appearing to delete the stolen data, a person who attended the call told NBC News.
Cybersecurity experts caution that cybercriminals can backtrack on promises not to release data, and it's impossible to verify that the hacker didn't make backup copies.
In December, a hacker gained what appears to be full access to the SIS information of those schools that had used customer support. While not the entirety of PowerSchool's customer base, the breach appeared to expose the data of tens of millions of American children. While exact numbers are still unclear, the hacker has claimed the figure to be 62 million. That figure was first reported by the tech news site Bleeping Computer.
As of Thursday, the breached data did not appear to be publicly available online.
Private assessments of the hack show the company failed to take basic steps to protect students' data. PowerSchool hired the cybersecurity firm CrowdStrike to help investigate the breach. An interim report prepared by CrowdStrike and disseminated to some school officials, the contents of which had not previously been public and which was acquired by NBC News, found no evidence that the hackers used malware or found a backdoor into PowerSchool's systems. Instead, the hacker simply obtained a single employee's password. That granted access to a 'Maintenance Access' function that let them download millions of children's personal information.
According to the CrowdStrike report, the company was not even aware that it had been the victim of such a massive hack until late December, several days after it happened, when the hacker contacted the company to inform it and ask for a payment.
CrowdStrike declined to comment, in line with industry practice.
In a private online chat that included company executives and school representatives, an executive admitted that the hackers were able to access and download the student records by logging into one account that didn't have two-factor authentication enabled, one of the most basic cybersecurity standards for any account, particularly one that has access to sensitive information. One participant, who requested not to be named, took a screenshot of the chat and shared it with NBC News.
Bill Fitzgerald, an independent security consultant for schools, said that was an example of poor security, though not uncommon in the EdTech industry.
'If you're not enforcing multifactor authentication, that's just not best practice,' Fitzgerald told NBC News. 'But this happens all the time.'
Doug Levin, the national director of K12 SIX, an industry nonprofit devoted to helping schools guard themselves from hackers, blamed lax cybersecurity standards across what's referred to as EdTech, the industry of education-focused technology that schools increasingly rely on, especially since the Covid-19 pandemic. Levin told NBC News that the hack and the lack of safeguards were both extreme but still emblematic of the industry.
'For a sector so integral to the American way of life, it is unconscionable that neither K-12 schools — nor their vendors — are held to a cybersecurity standard of practice,' he said, referencing cybersecurity issues that plague the sector. 'This incident is unique both for its scope and the sensitivity of the data.'
PowerSchool declined to share specifics on how many students were affected by the hack, citing its ongoing investigation, but a spokesperson said the company was confident the number of students whose Social Security numbers were compromised was less than 25% — a figure that could still reach into the tens of millions.
Terry Loftus, the chief information officer for the San Diego County Office of Education, where seven districts are PowerSchool customers, told NBC News he was particularly concerned about hackers accessing additional student information that some school districts include in SIS.
'We may be talking about disabilities and what supports are being put in place for special education students,' Loftus said. 'This is massively sensitive, and something that's of high value to threat actors, as far as reselling to various nefarious groups or data brokers.'
'As it stands right now or as it appears, unless we hear otherwise, this will likely ultimately be the largest breach of K-12 students,' he told NBC News.
In some cases, former students' information was also in the PowerSchool program and their personal information was stolen as well, the company said in a press release.
There is no formal public accounting of PowerSchool's reach, but it has statewide contracts with Alabama, North Carolina and South Carolina, though use of the SIS software can vary within a state. Other states where schools have warned students and parents about the PowerSchool breach include Alaska, Arizona, California, Colorado, Connecticut, Delaware, Illinois, Indiana, Kansas, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Dakota, Tennessee, Texas, Utah, Wisconsin and Wyoming.
Georgia broadcaster 11Alive has estimated from the state's Department of Education figures that more than 230,000 current students in the state may have been affected.
In some cases, school districts have warned that the hackers stole remarkably specific information. Utah Schools for the Deaf and the Blind announced that the hackers gained access to not just students' names, birthdays and grades, but also their locker numbers and combinations and the balances in their lunch accounts.
Sarah Powazek, the director of the University of California, Berkeley's public interest cybersecurity program, which offers cybersecurity help to schools and other civic organizations that may not be able to afford it, said schools are in the unfortunate position of trusting companies like PowerSchool to protect their students' private information.
'School districts really have no control over this product, and it's not up to them whether or not PowerSchool itself is implementing the correct security procedures within their own organization. The schools are very much at the mercy of these educational technology products,' Powazek told NBC News.
Publicly, PowerSchool has said it takes pains to ensure high cybersecurity standards. In 2023, CEO Hardeep Gulati joined then-first lady Jill Biden at a White House event promoting EdTech cybersecurity. The company's website says it takes a litany of steps to protect kids' and teachers' data, including routine security audits and 'Extensive and ongoing security/cybersecurity training for all our employees.'
PowerSchool is a signatory to another pledge, created by the nonprofit Future of Privacy Forum, in which it promises to take a series of basic steps to protect students' information. A spokesperson for the Future of Privacy Forum told NBC News that PowerSchool's status as a signatory is currently under review for 'potential violations of the company's Student Privacy Pledge commitments.'
This article was originally published on NBCNews.com
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
32 minutes ago
- Yahoo
New York Becomes First State to Require Employers Disclose When Layoffs Are Due to AI
If you lose your job as part of mass layoffs at your company because your boss believes an artificial intelligence model can do your work instead, they will have to start filing more paperwork disclosing the decision. That is according to a new law in New York state that requires employers to disclose if mass layoffs — which is defined as 50 or more workers — were due to AI. The change to New York's Worker Adjustment and Retraining Notification (WARN) system went into effect in March, but has received little coverage since then; Bloomberg was the first major outlet to report on the change on Thursday. Now, employers have to fill out a form at least 90 days before a mass layoff round, according to New York law, and check a box if the cuts are due to 'technological innovation or automation.' If that box is checked, the employers then go to another screen on the WARN website where they have to specify whether AI or another technology is the reason for the cuts. New York is the first state with such a law. Other states have looked to put safeguards in place against AI replacing workers, including in California, which had a law go into effect at the start of 2025 which protects actors from having their likeness used by AI models without informed consent; California also passed a similar law last year that requires the estates of dead actors and performers to give clearance for AI models to use their likeness. The new law in New York comes as AI's rapid rise has led to questions over which jobs are safe in a number of fields. This has been an issue in the media world as of late, where a number of outlets, like Axel Springer and News Corp. have signed content licensing deals with OpenAI, the parent company of ChatGPT. Editorial staff at some outlets have said they are concerned about newsrooms growing too cozy with AI models; the Vox Media Union, for example, called for protections to be put in place for writers at outlets like New York Magazine and The Verge so that their jobs would not be taken by AI bots. That concern is a common one in the U.S. A Pew Research Center survey earlier this year found 52% of Americans were 'worried' about AI in the workplace, compared to 36% who said they were 'hopeful' about it. The post New York Becomes First State to Require Employers Disclose When Layoffs Are Due to AI appeared first on TheWrap.

Yahoo
32 minutes ago
- Yahoo
FIFA Club World Cup: Are immigration authorities working security at Orlando matches?
Federal immigration authorities may be part of the security forces at Orlando venues as the FIFA Club World Cup kicks off on Tuesday. But so far, officials at all levels haven't given a straight answer. The quadrennial event is expected to draw thousands of soccer fans to matches at Camping World Stadium and Inter&Co Stadium between some of the biggest clubs in the world, including European powerhouses Liverpool and Juventus. The tournament is being held in 11 cities across the U.S. until July 13. In a now-deleted social media post, United States Customs and Border Protection exclaimed its agents would be 'suited and booted ready to provide security for the first round of games', specifically mentioning the tournament's kickoff Saturday in Miami. Immigration and Customs Enforcement also told a Miami television station that its agents would be at the contest at Hard Rock Stadium and that all non-American citizens should carry proof of legal status. Both agencies are entities within the Department of Homeland Security and are primarily responsible for carrying out President Donald Trump's mass deportation agenda. While the administration has said it was going after the 'worst of the worst' undocumented immigrants – presumably those with violent felony records – in recent weeks, administration officials have pushed the agencies to vastly increase their arrest numbers, seeking to reach 3,000 per day. The games in Orlando are expected to include clubs from South Korea, Brazil, Portugal, New Zealand, England, Italy, South Africa and Mexico. The first scheduled match is June 17 at Inter&Co Stadium between Ulsan HD of South Korea vs. Mamelodi Sundowns FC of South Africa. A spokesperson for the City of Orlando said neither City Hall nor the police department knew if federal authorities would be on hand. A spokesperson for Florida Citrus Sports directed questions to the city. A FIFA spokesperson didn't respond to questions, nor did a spokesperson for ICE. FIFA President Gianni Infantino was asked this week about the potential presence of immigration officials at a media event in Miami, to which he said he wasn't worried. 'No, I don't have any concerns about anything in the sense that we are very attentive on any security question, of course the most important for us is to guarantee security for all the fans who come to the games, this is our priority,' he said, according to NBC 6. A spokesman for Customs didn't directly answer a question from the Orlando Sentinel about whether the agency would be in Orlando, but said it isn't uncommon for the agency to work security as part of massive sporting events. 'U.S. Customs and Border Protection is committed to working with our local and federal partners to ensure the FIFA Club World Cup 26 is safe for everyone involved, as we do with every major sporting event, including the Super Bowl,' the agency said in an unsigned statement. 'Our mission remains unchanged.' A follow-up question about whether that included immigration enforcement did not receive a response. rygillespie@
Yahoo
32 minutes ago
- Yahoo
Ex-Illinois House Speaker Michael Madigan arrives at federal court for sentencing in corruption case
CHICAGO — Former Illinois House Speaker Michael J. Madigan arrived Friday at the federal courthouse in downtown Chicago for his historic sentencing in a long-running corruption case that shook the state's political world to the core. Madigan, 83, who for years was widely hailed as the most powerful politician in the state, gave a slight smile as he strode past a horde of television news cameras with his lawyers and family members without comment. Carrying a briefcase and umbrella, he then headed to the 12th floor courtroom of U.S. District Judge John Robert Blakey, who is scheduled to begin the hearing at 1 p.m. The hearing is expected to last two hours or more. With seating limited in Blakey's courtroom, an overflow courtroom has been set up on the courthouse's 17th floor. Before hearing arguments, Blakey must first determine the sentencing guidelines in the case, though it's no longer mandatory for him to follow them. It's unclear whether Madigan's team intends to call live witnesses on his behalf, but before the judge imposes the sentence, the famously taciturn former speaker will be given a chance to make a statement of his own. It's the most highly anticipated sentencing in a Chicago public corruption case since former Democratic Gov. Rod Blagojevich more than a decade ago, and U.S. District Judge John Robert Blakey has a wide range of options at his disposal. The difference between the recommendations of the two sides is stark. Prosecutors have asked for 12 ½ years in prison, while the ex-speaker's team requested five years of probation, with the first year on home confinement. One big question is whether the letters Blakey received on Madigan's behalf will help persuade him to go easy on the longest-serving speaker in American history. Under the federal rules, the judge must also balance the seriousness of the crime and the need for deterrence, both for Madigan and others who might be tempted to commit similar acts, with the ex-speaker's background, personal traits, family history and other good works. In justifying a lengthy prison sentence, prosecutors have argued Madigan used his public office to increase his power, line his own pockets and enrich a small circle of his most loyal associates. Madigan's legal team, meanwhile, have stressed his age and lifetime of public service, saying that he is a good man whose name was dragged through the mud and will forever be branded as a felon. After a trial that stretched nearly four months, Madigan was convicted by a jury Feb. 12 on bribery conspiracy and other corruption charges The jury found him guilty on 10 of 23 counts, including one count of conspiracy related to a multipronged scheme to accept and solicit bribes from utility giant Commonwealth Edison. Jurors also convicted him on two counts of bribery and one Travel Act violation related to payments funneled to Madigan associates for do-nothing ComEd subcontracts. Madigan also was convicted on six out of seven counts — including wire fraud and Travel Act violations — regarding a plan to get ex-Ald. Daniel Solis, a key FBI mole who testified at length in the trial, appointed to a state board. But after 11 days of deliberation, the jury's final verdict was mixed, deadlocking on several counts — including the marquee racketeering conspiracy charge — and acquitting Madigan on numerous others. Jurors also deadlocked on all six counts related to Madigan's co-defendant, Michael McClain. The verdict capped one of the most significant political corruption investigations in Chicago's sordid history. It also cemented an extraordinary personal fall for Madigan, the longest-serving state legislative leader in the nation's history, who for decades held an iron-tight grip on the House as well as the state Democratic Party. It was a case many thought would never be made. Madigan, a savvy lawyer and old-school practitioner of Democratic machine politics, famously eschewed cell phones and email, and stayed largely above the fray while dozens of his colleagues were hauled off to prison over the years. Ultimately, it took Solis's extraordinary cooperation, including wearing a hidden wire in meetings with Madigan, along with an FBI wiretap on Madigan's longtime confidant, Michael McClain, to break the case open, leading to a series of indictments and pay-to-play allegations against two major utilities, Commonwealth Edison and AT&T Illinois, and more than a dozen other individuals. Madigan held the speakership for all but two years from 1983 until 2021. Along with ruling the House, Madigan chaired the Illinois Democratic Party from 1998 until 2021, resigning both his House seat and the party post after he lost the speakership. Madigan's hold on the House Democratic caucus started loosening in the wake of a series of explosive sexual harassment cases involving misbehaving aides in 2018, including longtime chief of staff Tim Mapes. But the momentum picked up speed in July 2020 when the U.S. attorney's office reached a deferred prosecution agreement with ComEd, which acknowledged trying to influence Madigan by showering his pals and associates with do-nothing contracts, legal work and a seat on the ComEd board of directors. While ComEd agreed to pay a $200 million fine, the biggest political marker in the agreement was that Madigan was referenced clearly when the court document called the speaker of the House 'Public Official A.' McClain and three others were indicted in the separate ComEd Four case four months later. Sentencings in that case, which have been delayed for more than a year due to fallout from a U.S. Supreme Court ruling on the federal bribery statute, are now expected to unfold in July and August. ______